Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
19s -
max time network
20s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 20:33
Static task
static1
Behavioral task
behavioral1
Sample
Bootstrapper.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Bootstrapper.exe
Resource
win10v2004-20240802-en
General
-
Target
Bootstrapper.exe
-
Size
923KB
-
MD5
343bb17960dc5c071314d0a44473ba64
-
SHA1
4eaa02287ba44b57ab159f8366d1abc45c8d7ba5
-
SHA256
6b6f98691ad3c5c01e11d627be9978d9df562c33b65ff0715426cdfd0f212f19
-
SHA512
7f145aeee8c73066d81ab0a5a798191495cd21f42c310b94df6c29524ff5fc12875f93afcdb888057497854a82e85822c072050abb4bc8b639b746c7641d5b8f
-
SSDEEP
12288:6/2DLTG5cGueGAZlyW9NRLKeDdWTdInZKgAOw/0u6b084sxE3jjVjmg+sjrYjHd1:ks9RwpNR9BZdLw/0PjvyjjhyHq
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Loads dropped DLL 2 IoCs
pid Process 5004 Bootstrapper.exe 2528 Bootstrapper.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 5004 set thread context of 4860 5004 Bootstrapper.exe 87 PID 2528 set thread context of 4488 2528 Bootstrapper.exe 108 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bootstrapper.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bootstrapper.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4860 MSBuild.exe 4860 MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeBackupPrivilege 4860 MSBuild.exe Token: SeSecurityPrivilege 4860 MSBuild.exe Token: SeSecurityPrivilege 4860 MSBuild.exe Token: SeSecurityPrivilege 4860 MSBuild.exe Token: SeSecurityPrivilege 4860 MSBuild.exe Token: SeDebugPrivilege 4860 MSBuild.exe Token: SeBackupPrivilege 4488 MSBuild.exe Token: SeSecurityPrivilege 4488 MSBuild.exe Token: SeSecurityPrivilege 4488 MSBuild.exe Token: SeSecurityPrivilege 4488 MSBuild.exe Token: SeSecurityPrivilege 4488 MSBuild.exe Token: SeDebugPrivilege 4488 MSBuild.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 5004 wrote to memory of 4860 5004 Bootstrapper.exe 87 PID 5004 wrote to memory of 4860 5004 Bootstrapper.exe 87 PID 5004 wrote to memory of 4860 5004 Bootstrapper.exe 87 PID 5004 wrote to memory of 4860 5004 Bootstrapper.exe 87 PID 5004 wrote to memory of 4860 5004 Bootstrapper.exe 87 PID 5004 wrote to memory of 4860 5004 Bootstrapper.exe 87 PID 5004 wrote to memory of 4860 5004 Bootstrapper.exe 87 PID 5004 wrote to memory of 4860 5004 Bootstrapper.exe 87 PID 2528 wrote to memory of 4488 2528 Bootstrapper.exe 108 PID 2528 wrote to memory of 4488 2528 Bootstrapper.exe 108 PID 2528 wrote to memory of 4488 2528 Bootstrapper.exe 108 PID 2528 wrote to memory of 4488 2528 Bootstrapper.exe 108 PID 2528 wrote to memory of 4488 2528 Bootstrapper.exe 108 PID 2528 wrote to memory of 4488 2528 Bootstrapper.exe 108 PID 2528 wrote to memory of 4488 2528 Bootstrapper.exe 108 PID 2528 wrote to memory of 4488 2528 Bootstrapper.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\Bootstrapper.exe"C:\Users\Admin\AppData\Local\Temp\Bootstrapper.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4860
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\Bootstrapper.exe"C:\Users\Admin\AppData\Local\Temp\Bootstrapper.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4488
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42B
MD584cfdb4b995b1dbf543b26b86c863adc
SHA1d2f47764908bf30036cf8248b9ff5541e2711fa2
SHA256d8988d672d6915b46946b28c06ad8066c50041f6152a91d37ffa5cf129cc146b
SHA512485f0ed45e13f00a93762cbf15b4b8f996553baa021152fae5aba051e3736bcd3ca8f4328f0e6d9e3e1f910c96c4a9ae055331123ee08e3c2ce3a99ac2e177ce
-
Filesize
2KB
MD560ad21e008a8447fc1130a9c9c155148
SHA15dfa21d14dc33de3cc93a463688fe1d640b01730
SHA256bb65e24fd8681e7af464e115fba42ff7713e933683cbd654a124c0e564530bb9
SHA51242a2753f717a4984967907fa69200e8a464068a6d4a226803cf9503ffb7fee540ffc611b4c905cc84f3623639a6aa93003b390f9c38e601b59f171a9e90bd9b6
-
Filesize
1.2MB
MD529aabd72d8c026566f2b537e14ac2122
SHA1d71f874e88fa097853d618ff2f59a1c427d81c2c
SHA256482ded29fe68b2a68359aae1bd7ef4d434687d5c4058d2374cc63a38813f43cc
SHA5120c2297c86e6d42f134ee2a9ed03f1cc870bd841dab3df4786644e894252d876df2a38b18c66943755957147a17e1e41922581f211c6aab98dfc3032254e96b9c